“How to Stop Malware” – Strategies and Tools of Cyber Criminals

26 August 2014 Internet, IT & e-Discovery Blog Blog
Authors: Peter Vogel

Dell’sAnatomy of a cyber-attack” focuses on malware because malware “comes in various forms, some more nefarious than others, ranging from annoying sales pitches to potentially business-devastating assaults.”  This “how to” report from Dell makes the point that you “need to understand the enemy before you can defeat them” and includes these Attack Steps:

Attack step 1: Reconnaissance and enumerationCyber-criminals will do anything to find and exploit your weaknesses

Attack step 2: Intrusion and advanced attacks – A stealthy intruder can access every facet of your network systems.

Attack step 3: Malware insertionHidden malware gives your attacker the keys to your network.

Malware type 1: Nuisance malwareNuisance adware can render a system inoperable if not removed properly.

Malware type 2: Controlling malwareHidden malware gives your attacker the keys to your network.

Malware type 3: Destructive malwareViruses and worms can devastate your network—and your business.

Attack step 4: Clean-up – A skilled criminal can compromise your network without you ever knowing.

Cybercrime is daily front page news and although there is not one solution, Dell’s point is that it has a technology to help called Dell SonicWALL which “offers a comprehensive line of defenses against all forms of cyber attack and malware.”

This blog is made available by Foley & Lardner LLP (“Foley” or “the Firm”) for informational purposes only. It is not meant to convey the Firm’s legal position on behalf of any client, nor is it intended to convey specific legal advice. Any opinions expressed in this article do not necessarily reflect the views of Foley & Lardner LLP, its partners, or its clients. Accordingly, do not act upon this information without seeking counsel from a licensed attorney. This blog is not intended to create, and receipt of it does not constitute, an attorney-client relationship. Communicating with Foley through this website by email, blog post, or otherwise, does not create an attorney-client relationship for any legal matter. Therefore, any communication or material you transmit to Foley through this blog, whether by email, blog post or any other manner, will not be treated as confidential or proprietary. The information on this blog is published “AS IS” and is not guaranteed to be complete, accurate, and or up-to-date. Foley makes no representations or warranties of any kind, express or implied, as to the operation or content of the site. Foley expressly disclaims all other guarantees, warranties, conditions and representations of any kind, either express or implied, whether arising under any statute, law, commercial use or otherwise, including implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Foley or any of its partners, officers, employees, agents or affiliates be liable, directly or indirectly, under any theory of law (contract, tort, negligence or otherwise), to you or anyone else, for any claims, losses or damages, direct, indirect special, incidental, punitive or consequential, resulting from or occasioned by the creation, use of or reliance on this site (including information and other content) or any third party websites or the information, resources or material accessed through any such websites. In some jurisdictions, the contents of this blog may be considered Attorney Advertising. If applicable, please note that prior results do not guarantee a similar outcome. Photographs are for dramatization purposes only and may include models. Likenesses do not necessarily imply current client, partnership or employee status.

Authors

Related Services